That is a DNS redirection where a Domain is not found, the user is redirected to searchguide.level3.com
It means that you are using a Level-3 DNS server and this is normal and not in anyway related to malwarebytes.
I just tried a URL where I changed the domain Name and I got...

There is no such thing as a "rootkit virus" just like there is no such thing as a Chevy Ford.
RootKits are a type of trojan. Viruses and trojans are sub-types of malware just like Chevrolet and Ford are types of automobiles.

None of those symptoms are from malware.
Malware is either stealthy such that it can perform the objective of the payload in secrecy for as long as possible or is self evident, such as the subtype of trojans called "adware", by Pop-Ups, consistent redirection to specific sites, etc.
There is a subtype of semi-malicious utilities that are classed as "Jokes". They may open a CD/DVD drive, etc.
There is no malware that resides in the BIOS at this time.
If you think you are truly infected we will close this thread and you'll create a new post requesting that you need assistance in verify if your PC is infected or not. In that post, do not post any conclusions. Just post that you request assistance in verifying your system and nothing else.

The OS marks the construct as a part of the System and is Hidden.
This is not a virus. That's a faux conclusion. In fact on 99% of malicious files calling it a "virus" is a faux conclusion. The terminology "virus" is overly used and very much abused. All viruses are malware but not all malware are viruses. The vast majority of malware are trojans. To be a virus the malicious code must be able to self replicate. That is to be a virus the code must be able to spread from "file to file", "file to system" , "system to system" or "system to file" autonomously. Trojans need assistance to spread.
Malware does not create the Recycle Bin. It is an Operating System Construct.
You stated " its somehow associated with virus ". No malware has been identified to draw that conclusion.

Fake notification from a website and it eminates from the 'net and NOT from your PC. A true Anti Virus application that scans and detects scripted malware would detect this as a HTML.FakeAlert ( aka; TechBrolo ).
I have created a 1series of videos generated from these fraud sites for the purposes of recognition and education. They are all videos from real web sites. ALL are FRAUDS.
All these have one thing in common and they have nothing to do with any software on your PC. They are all nefarious web sites meant to defraud you of money. The objective is to, falsely, goad you to make the phone call and pay for some service contract for an incident that never happened. From there they may continue to charge your Credit Card for other services, remote into your computer and do real damage and/or exfiltrate your personal data and they may use the information they obtain from you to commit additional frauds.
MalwareScam.wmv MalwareScam-1.wmv MalwareScam-2.wmv MalwareScam-3.wmv MalwareScam-4.wmv MalwareScam-5.wmv MalwareScam-6.wmv
I have also created a PDF ScreenShow of a myriad of FakeAlert screens - FakeAlert-Screens.pdf
Reference: US FBI PSA - Tech Support Scam
1. Also located at "My Online Security" - Some videos of typical tech support scams

That is correct !
However if they were using a CAC or FIPS-201 compliant Federal PIV they would enter a PIN that would be shorter than a password and the dialogues would be associated with Pubic Key procedures. Even the entity logo is wrong. Most likely the dialogue would not show a DoD logo but a subordinate organizational logo such as; DISA, DIA, Army, Navy, etc. and state that it is a Department of Defense Computer System and it would also state the system's classification level.

BIOS malware is too difficult due to that fact there are many logistical obstructions starting with; the motherboard manufacturer, the EEPROM chipset used, the BIOS checksum verification process and the implementation of the Trusted Platform Module ( TPM ) .
There have been cases of what is called the The Insider Threat. There was a case some years back where a disgruntled employee inserted code into a BIOS routine that played the PC speaker ( I can't recall what the tune was ).
However, there have been "lab experiments" ( I believe performed prior to TPM implementation ) but only targeted one particular platform from a Chinese manufacturer.
You will find that when it comes to malicious activity "Greatest Bang for the Buck" is the philosophy so the malicious actors will implement a methodology that serves to reach the most amount of prospective victims in the shortest amount of time. That precludes the BIOS vector.
NOTE: The exception being a targeted attack against a High Value Target by a state sanctioned IC.